WikiLeaks:Understanding submissions

From WikiLeaks

This page is intended to provide an insight into processing of documents at Wikileaks, from submission to the release to the public. While the chart does not include all details, it presents all relevant steps a submission goes through before publication. It has been created in an effort to enhance the understanding of the general public and the media of Wikileaks operations.All files are processed in cryptographically secure, isolated environments making use of AES256, US DoD TOP SECRET-approved encryption for long-term storage as well as system swap memory.

.
2. The document is checked against the submission criteria. If matching, processing continues.

3. None-matching documents are safely disposed of.

4. Information from the source is processed into according channels.

5. The document is cleaned from compromising metadata (according to NSA and WL-internal standards), renamed to the WL naming standard, and eventually converted to an appropriate file type.

6. A release version of the document is produced and moved to the final destination.

7. The leak descriptor is compiled from various information sources, including description (A) by the submitter, notes (B) by WL staff editors and a summary (C) by volunteers and/or staff. The document is tied to related organisations, countries, its cryptographic identity and other information.

8. A final check verifies if the document has been embargoed by the submitter. In case of an embargo date set, an according publication delay will be established.

9.The document is published via the leak descriptor page and available to the public.